Secondary navigation

You are here

IS-3 Resources for Researchers

Overview

Increasingly, data sharing agreements and research funding agreements include cyber security requirements. Researchers working with protected data may be affected by the updates from the system-wide Information Security Policy (IS-3).

If you’re conducting research on behalf of UC, you’re considered a Workforce Member and should follow the requirements for that role.

Other items to consider:

Invest appropriately. Be aware that bad things can happen to your data – anything from outright theft to the use of ransomware to encrypt it so you no longer have access. UC has lost research data that can’t be replaced because of ransomware … and UC researchers are often targeted. If you need help or have questions, email security@berkeley.edu

Manage suppliers responsibly. If you work with external Suppliers in any capacity, make sure they review the system-wide Information Security Policy (IS-3) and comply with all applicable requirements.

See Section 15: Supplier Relationships for a list of specific tasks and considerations for external Suppliers.